Get the standard ports and run all the scripts and checks on them:
nmap -n -v -sT -A <IP or FQDN> -oN nmap
Get a full TCP scan:
nmap -n -v -sT -p- -Pn -A -T5 <IP or FQDN> -oN nmap
Get a SYN scan:
<aside> ℹ️
The SYN scan sends a SYN packet (which is the first part of the TCP handshake sequence) to a port, and analyzes the response to determine whether the port is open, closed, or filtered.
</aside>
nmap -v -A -O -p- -T4 -Pn -sS -sC <IP or FQDN> -oN nmap